Computing and Information Technology DSST 2023 WITH COMPLETE SOLUTION
Which of the following performs a computer's computations and logical operations? ALU (arithmetic and logic unit) Which of the following types of memory loses data when the power to a computer is turned off? a. Nonvolatile memory b. Flash memory c. Volatile memory d. Programmable read-only memory (PROM) Volatile memory Each of the following represents a mass storage device EXCEPT a. laser printers b. floppy disks c. hard disks d. tapes laser printers Which of the following is an output device? a. Mouse b. Joystick c. Trackball d. Speaker Speaker On a traditional magnetic disk, each track contains a. a uniform number of sectors, standard to all magnetic disks b. fewer sectors the closer it is to the center of the disk c. the same number of sectors regardless of its position on the disk d. more sectors the closer it is to the center of the disk c. the same number of sectors regardless of its position on the disk Which of the following types of modems is a circuit board that plugs into one of a computer's expansion slots? a. Full-duplex b. Internal c. Fax d. External b. Internal Which of the following terms is commonly used to refer to the overall conceptual design of a computer system? a. Mainframe b. Machine language c. System unit d. Architecture d. Architecture Which of the following methods allows for the integration of an entire computer processor on a single microchip? a. CISC b. VLSI c. RISC d. MIDI b. VLSI (very-large-scale integration) A digital signal is characterized by each of the following EXCEPT a. it is discrete b. it is finite c. it degrades with reproduction d. it is absolutely replicable c. it degrades with reproduction Which of the following represents the current worldwide character encoding standard? a. ASCII b. Hexadecimal c. ANSI d. Unicode d. Unicode Each of the following represents a type of digital image format EXCEPT a. TIFF b. GIF c. RGB d. PNG c. RGB Data transfer rates are usually measured in terms of which of the following units of time? a. Seconds b. RPM c. Minutes d. Half-minutes a. Seconds Which of the following tags are used to create a hyperlink? a. <a href></a> b. <b> </b> c. <color> </color> d. <table> </table> a. <a href></a> All the following are image file formats EXCEPT: a. JPEG b. PNG c. DOC d. BMP c. DOC Which of the following terms describes software that is neither copyrighted nor protected by copyright laws and can be distributed or copied freely? a. Public domain software b. Proprietary software c. Shrink-wrap license d. HTML a. Public domain software Which of the following is NOT a function of a computer's operating system? a. Keep track of all files stored on the computer b. Facilitate communication between computers that are linked together c. Maximize throughput of a computer d. Protect a computer against harmful viruses d. Protect a computer against harmful viruses Which of the following describes a set of software development tools that helps the user to create applications? a. Software development kit (SDK) b. Data flow diagram (DFD) c. Gantt chart d. .docx file a. Software development kit (SDK) Each of the following represents a type of language translator used in the software development process EXCEPT a. assembler b. compiler c. interpreter d. report generator d. report generator Which of the following software development tools generates code based on a detailed explanation of the data that needs to be processed? a. Report generator b. Application generator c. Query language d. Identifier b. Application generator A software development tool that enables programmers to track down hard-to-find logic errors is known as a.. d. debugger A graphical-user interface that is added to an operating system is known by each of the following terms EXCEPT a. windowing environment b. Windows c. operating environment d. shell b. Windows Each of the following is an example of a desktop publishing application program EXCEPT a. PageMaker b. Quark XPress c. FileMaker Pro d. Microsoft Publisher c. FileMaker Pro Word processed texts that are aligned at both the left and right margins are referred to as.. c. justified Each of the following is a common trait of most spreadsheet programs EXCEPT a. organization is based on columns and rows b. calculations are performed using formulas c. data is entered into worksheets d. tables are defined before data is entered d. tables are defined before data is entered A program consisting of recorded keystrokes that can be called on to execute those keystrokes to accomplish a task is known as a a. macro b. modeler c. absolute reference d. command a. macro Each of the following is typically required to run multimedia applications on a computer EXCEPT a. sound card b. high-resolution color monitor c. CD-ROM drive d. microphone d. microphone A unique value that allows a database to access information regarding an individual record is known as a(n).. d. index Which of the following terms is used to refer to an information retrieval technique that allows the computer to access information directly, without having to go through a defined series of locations? a. Random access b. Hierarchical access c. Sequential access d. Binary access a. Random access In which of the following types of database models are files connected on the basis of logical relationships between data? a. Object b. Hierarchical c. Relational d. Network c. Relational Which of the following is used in graphics programs to produce new two-dimensional digital images by combining an original image with a mathematical function? a. Lathing b. Extrusion c. Filtering d. Solid modeling c. Filtering Which of the following laws updated the U.S. copyright law in accordance with the current technology? a. Children's Online Privacy Protection Act b. Children's Internet Protection Act c. Freedom of Information Act d. Digital Millennium Copyright Act d. Digital Millennium Copyright Act An Internet user who wishes to start on the Internet at a Web site that contains a broad array of information and services would be most likely to choose a. answer b. a portal c. a database site d. an XML page b. a portal Which of the following represents the generic term for high-speed Internet access? a. Broadband b. Bandwith c. Dialup d. POTS a. Broadband LAN can generally extend up to how many kilometers? a. 50 b. 150 c. 200 d. 1000 a. 50 Each of the following represents an example of a WAN EXCEPT a. PDN b. SNA c. PBX d. ARPANET c. PBX (private branch exchange) In simple parity error detection, the ratio of parity bits to data bits is a. 1:8 b. 1:7 c. 7:1 d. 8:1 1:7 During data communications, which of the following represents random electronic signals that can modify encoded signals in unpredictable ways? a. Codec b. Modulator c. Receiver d. Noise d. Noise Which of the following stages of the software life cycle usually occurs after a program has been tested and debugged? a. Coding b. Analysis c. Design d. Maintenance d. Maintenance Which of the following is an example of a declarative programming language? a. Prolog b. C c. C++ d. Java a. Prolog Algorithms are expressed informally in human-readable language using which of the following? a. Loops b. Pseudocode c. Primitives d. Semantics b. Pseudocode Which of the following provides a description of how the organization of a website will collect and use your personal information? a. Privacy policy b. Mission statement c. Terms of service d. Site map a. Privacy policy In Boolean logic, the value of the expression NOT (y > 7) is a. true if y has the value 6 b. false if y has the value 3 c. true if y has the value 10 d. false if y has the value 7 a. true if y has the value 6 In executing a software program, which of the following control mechanisms represents the default case? a. Sequential b. Conditional c. Looping d. If-else a. Sequential The Honeywell 400 represents an example of which of the following types of computers? a. Transistorized b. Vacuum-tubed c. Minicomputer d. Integrated circuit a. Transistorized When the IBM PC was introduced, it ran on which of the following microprocessors? a. Intel 80486 b. Intel 8088 c. Intel 8086 d. Intel Pentium b. Intel 8088 The first commercially viable computer, place in operation a the U.S. Bureau of Census in 1951, was known as the a. UNIVAC 1 b. IBM System/630 c. PDP-8 d. IBM 650 a. UNIVAC 1 Each of the following represents a use of information technology that could potentially pose a threat to individual privacy EXCEPT a. enabling organizations to obtain information on an individual's health history b. providing telemarketers with access to individual contact information c. requiring an individual to enter a password before logging on to a network d. providing government organizations with access to an individual's genetic profile c. requiring an individual to enter a password before logging on to a network Concerning issues of computer ethics, statements that indicate what individuals should do under certain circumstances are known as a. functional statements b. normative statements c. descriptive statements d. algorithmic statements b. normative statements In the area of artificial intelligence, an interactive computer system that simulates the human thought process by responding to questions, asking for clarification, and making recommendations is known as a(n) a. expert system b. pattern recognition system c. neural network d. digital vision-inspection system a. expert system Which of the following computer programs, designed by Joseph Weizenbaum of MIT in the 1960s, was designed to converse in English and to imitate a psychotherapist? a. MYCIN b. ELIZA c. DENDRAL d. Lisa b. ELIZA The ultimate mission of a computer virus is known as its a. time bomb b. punkware c. payload d. Michelangelo c. payload Which of the following is an encryption system for Internet use? a. PGP b. ITAR c. Key Buffer d. Pin Grid Array a. PGP (Pretty Good Privacy) Which of the following professional certifications qualifies an IT specialist to provide network support for a particular brand of networking products? a. Microsoft Office Specialist Master Instructor b. Certified Novell Administrator c. Microsoft Certified Database Administrator d. Sun Certified Programmer for the Java 2 Platform b. Certified Novell Administrator
Escuela, estudio y materia
- Institución
- Computing and Information Technology DSST
- Grado
- Computing and Information Technology DSST
Información del documento
- Subido en
- 9 de febrero de 2023
- Número de páginas
- 12
- Escrito en
- 2022/2023
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
which of the
-
computing and information technology dsst 2023 with complete solution
-
which of the following performs a computers computations and logical operations alu arithmetic and logic unit